Lines Matching defs:using
24 using its external network interfaces.
29 fingerprinting, we will show here an example using \textbf{nmap}:
76 Although this method is not really known and widespread, using a wireless scanner
83 The Linksys WRT54G was originally hacked by using a "ping bug" discovered in the
88 by using \textbf{nmap -sV} or so, you might be interested in using exploits to reach
136 By using a serial port and a level shifter, you may reach the console that is being shown by the device
140 \subsection{Finding and using the manufacturer SDK}
159 I am using a <device name>, and I cannot find neither on your website nor on the
178 or functional firmware using it, but parts of it, like only the kernel, or only
347 firmware and the device that will be flashed using this binary firmware.
539 This kernel configuration will only contain the relevant symbols to support your target and can be changed using \texttt{make kernel\_menuconfig}.